ransomware

  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes the transition from human-led to…

2 weeks ago
  • Trends

3 Major Shifts Revealed in the Lumu Compromise Report 2026

Reading Time: 6 minsWe have entered a new ‘Age of Adaptation’. The enemy is becoming more difficult to stop at…

2 months ago
  • Attacks

Advisory Alert: How DeathRansom Walks Straight Into Your Network

Reading Time: 5 minsDeathRansom ransomware has evolved, hiding in malicious PDFs to bypass defenses. It does not break down the…

4 months ago
  • Attacks

Advisory Alert: Gunra Ransomware’s 5-Day Ultimatum

Reading Time: 7 minsGunra ransomware targets critical industries using a strict five-day payment deadline. Learn about Gunra and ransomware detection…

7 months ago
  • Attacks

Advisory Alert: Sarcoma Ransomware Double Extortion Threat

Reading Time: 6 minsWhat is Sarcoma ransomware? This new double extortion threat both steals sensitive data and encrypting systems. You…

7 months ago
  • Attacks

Cybercrime in the Education Sector

Reading Time: 5 minsCybercrime in the education sector is having a field day while educational institutions are suffering at the…

11 months ago
  • Attacks

Akira Ransomware and the IoT Security Gap

Reading Time: 3 minsThe recent Akira ransomware attack, which exploited a vulnerable webcam to bypass EDR, underscores the critical need…

12 months ago
  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’ security setup, but cybercriminals are…

1 year ago
  • Trends

Lumu Compromise Report 2024: 2 Essential Tips for MSPs to Protect Clients

Reading Time: 4 minsFor MSPs to proactively protect their clients they need good intelligence, such as the trends and tendencies…

1 year ago
  • Trends

3 Cybersecurity Trends From the Lumu Compromise Report 2024

Reading Time: 3 minsLumu’s new Compromise Report 2024 reveals the greatest current cybersecurity trends and how to defend against them.…

1 year ago
  • Attacks

Advisory: CISA Releases Advisory on RansomHub Ransomware Attacks

Reading Time: 4 minsRansomHub is a new ransomware group offering Ransomware as a Service that has already encrypted and exfiltrated…

2 years ago
  • Blog

Back-to-School K–12 Cybersecurity Tips

Reading Time: 4 minsEssential cybersecurity tips to safeguard K-12 schools during the back-to-school season.

2 years ago
  • Attacks

Advisory Alert: Snowflake Supply Chain Attack

Reading Time: 3 minsExplore the Snowflake supply chain attack, how infostealer malware impacted hundreds of major companies, and essential measures…

2 years ago
  • Attacks

Local Government and Education Cybersecurity Advisory

Reading Time: 6 minsLocal Government and Education Institutions are under increasing threat from cyber criminals. Explore how these critical sectors…

2 years ago
  • Attacks

PAN-OS Firewall Vulnerability Advisory: Perimeter Defense Breakdown

Reading Time: 4 minsThe Palo Alto Networks PAN-OS firewall vulnerability exemplifies critical flaws in traditional perimeter defenses. Understand how Lumu's…

2 years ago